Safety and transparency are important in aviation. One tool that helps here is the Cockpit Voice Recorder (CVR), which records audio from the cockpit during flights. It is crucial for accident ...
Access cards can be cloned There are practical measures to make card cloning difficult Practical guidance on how these systems work and why you should make sure they’re configured right What is a ...
A silly-season BLE connectivity story Overheat people’s smart ski socks …but only when in Bluetooth range AND when the owner’s phone is out of range of their feet! Having experienced painfully cold ...
“Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the chaos of a cybersecurity breach. Accept that you will get punched in the face Train ...
Your door access control system (aka a physical access control system or PACS), also referred to as RFID cards or ‘swipe’ cards often have a poor reputation for being vulnerable to cloning attacks.
A red team engagement is an objective-based assessment that requires a holistic view of the organisation from the perspective of an adversary. This assessment process is designed to meet the needs of ...
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
ICS (Industrial Control Systems) cyber security deals with the security of the control systems and associated processes, equipment, and instrumentation that are used in a wide range of sectors. We ...
The threat landscape has never been more challenging. Significant numbers of highly skilled and motivated threat actors present a real danger. They have many potential goals such as penetrating your ...
An Attack Surface Assessment (ASA) is an intentionally time constrained exercise that uses open-source information in a largely passive way to establish what services you are publishing to the ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...